Windows Vulnerabilities
Last updated
Last updated
This can be used to perform the attack, creating copies of the aforementioned registry hives:
These copies can then be transferred back to the attack host, where impacket-secretsdump is used to extract the hashes:
Checking for Spooler Service
We can quickly check if the Spooler service is running with the following command. If it is not running, we will receive a "path does not exist" error.
Adding Local Admin with PrintNightmare PowerShell PoC
First start by bypassing the execution policy on the target host:
Now we can import the PowerShell script and use it to add a new local admin user.
https://github.com/calebstewart/CVE-2021-1675